identity

person s hand reaching out to a light

Implementing Fine-Grained Access (#FGA) Control with Relationship-Based Access Control (#ReBAC) in Open Policy Agent (#OPA)

Open Policy Agent (OPA) is a powerful open source policy engine that can be used to enforce access control policies in cloud-native applications. OPA is highly flexible and extensible, and it can be used to implement a wide range of authorization policies. In this blog post, we will show how to implement fine-grained access control …

Implementing Fine-Grained Access (#FGA) Control with Relationship-Based Access Control (#ReBAC) in Open Policy Agent (#OPA) Read More »

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data

Introduction As Chief Information Officer (CIO) or Customer Identity and Access Management (CIAM) leader, it’s essential to understand the current nature of how organizations collect personal data about their consumers, which includes both direct and indirect methods such as tracking cookies, social media mining, customer surveys, and purchase history analysis. While this wealth of data …

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data Read More »

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks

April 25, 2023 Introduction As a cybersecurity professional, I’ve seen firsthand how important it is for businesses to have strong customer identity and access management (CIAM) systems in place. These systems allow companies to provide secure access to their products and services, while also protecting their customers’ sensitive information. However, with the rise of sophisticated …

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks Read More »

Transforming Your CIAM Program: A New CIO’s Guide to Building a Product-Led Team

Introduction As a new Chief Information Officer (CIO), you may be tasked with modernizing your organization’s Customer Identity and Access Management (CIAM) program. A key component of this transformation is transitioning towards a product-led approach, which emphasizes customer-centricity, agility, and cross-functional collaboration. In this blog post, we will discuss how a new CIO can engage …

Transforming Your CIAM Program: A New CIO’s Guide to Building a Product-Led Team Read More »

person walking on the road

Leveraging Enriched Identity Data for IAM: 5 Key Use Cases

As a leader in identity and access management, you understand the critical importance of customer identity data. But what about enriched identity data? Enriched identity data refers to customer data that has been enhanced or augmented with additional information to provide deeper insights into customer behavior, preferences, and demographics. In this blog post, we’ll explore …

Leveraging Enriched Identity Data for IAM: 5 Key Use Cases Read More »

abstract close up cobweb connection

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game

In this article, I’ll discuss the advantages of using graph databases over LDAP for metadata labeling and verification. Verifying identity data, either by using a third-party verification or some internal mechanism, allows you to trust the data you have and use it for potentially higher-risk transactions. That’s where graph databases come in, as they offer …

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game Read More »

a person sitting on the floor with vr goggles using a computer

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems

Introduction The digital landscape has undergone a significant transformation in the way we transact and verify our identities. Digital wallets have facilitated this change by combining the traditional roles of physical wallets and ID cards into a single, convenient digital platform. In this blog post, we will explore the thesis that digital wallets are becoming …

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems Read More »

ambulance architecture building business

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j

At a major medical center, managing access to sensitive patient health information is a critical concern. To ensure that patient data is protected, the center has implemented a Relationship-Based Access Control (ReBAC) system using Neo4j, which provides a flexible and granular approach to managing access control. The ReBAC system includes four key roles: doctors, patients, …

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j Read More »

close up photo of a stethoscope

The Future of CIAM – Part 4 

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification What is identity onboarding? Identity onboarding is the process of gathering and verifying an individual’s identity and personal information when they sign up for a service or open an account with an organization. The purpose of identity onboarding is to ensure …

The Future of CIAM – Part 4  Read More »

Driver's Licence - Issued to Archibald Gordon Maclaurin, Essex County Council, 4 Mar 1927

Part 3 – The Future of CIAM

Harnessing the Power of Verifiable Credentials Welcome to Part 3 of our guide to Modern Consumer Identity and Access Management (CIAM) Platform! In this installment, we’ll be discussing the use cases and industries impacted by decentralized identity and verifiable credentials. Decentralized identity and verifiable credentials have become hot topics in the tech world as they …

Part 3 – The Future of CIAM Read More »

Scroll to Top